+/* $OpenLDAP$ */
/*
* Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
#include "slap.h"
#include "lutil.h"
-#include "ldap_defaults.h"
-
#ifdef SLAPD_LDAP
#include "back-ldap/external.h"
#endif
#ifdef SLAPD_TCL
#include "back-tcl/external.h"
#endif
+#ifdef SLAPD_NTDOMAIN
+#include "back-domain/external.h"
+#endif
static BackendInfo binfo[] = {
#if defined(SLAPD_LDAP) && !defined(SLAPD_LDAP_DYNAMIC)
#if defined(SLAPD_SHELL) && !defined(SLAPD_SHELL_DYNAMIC)
{"shell", shell_back_initialize},
#endif
-#if defined(SLAPD_TCL) && !defined(SLAPD_LDAP_TCL)
+#if defined(SLAPD_TCL) && !defined(SLAPD_TCL_DYNAMIC)
{"tcl", tcl_back_initialize},
+#endif
+#if defined(SLAPD_NTDOMAIN) && !defined(SLAPD_NTDOMAIN_DYNAMIC)
+ {"ntdom", domain_back_initialize},
#endif
{NULL}
};
/* open each backend database */
for( i = 0; i < nBackendDB; i++ ) {
+ /* append global access controls */
+ acl_append( &backendDB[i].be_acl, global_acl );
+
if ( backendDB[i].bd_info->bi_db_open ) {
rc = backendDB[i].bd_info->bi_db_open(
&backendDB[i] );
/* close each backend database */
for( i = 0; i < nBackendDB; i++ ) {
- BackendInfo *bi;
-
if ( backendDB[i].bd_info->bi_db_close ) {
backendDB[i].bd_info->bi_db_close(
&backendDB[i] );
if(rc != 0) {
Debug( LDAP_DEBUG_ANY,
"backend_close: bi_close %s failed!\n",
- bi->bi_type, 0, 0 );
+ backendDB[i].be_type, 0, 0 );
}
}
return 0;
}
-BackendInfo* backend_info(char *type)
+BackendInfo* backend_info(const char *type)
{
int i;
BackendDB *
backend_db_init(
- char *type
+ const char *type
)
{
Backend *be;
be->bd_info = bi;
be->be_sizelimit = defsize;
be->be_timelimit = deftime;
+ be->be_dfltaccess = global_default_access;
+
+ /* assign a default depth limit for alias deref */
+ be->be_max_deref_depth = SLAPD_DEFAULT_MAXDEREFDEPTH;
be->be_realm = global_realm != NULL
? ch_strdup( global_realm ) : NULL;
}
Backend *
-select_backend( char * dn )
+select_backend( const char * dn )
{
int i, j, len, dnlen;
int
be_issuffix(
Backend *be,
- char *suffix
+ const char *suffix
)
{
int i;
}
int
-be_isroot( Backend *be, char *ndn )
+be_isroot( Backend *be, const char *ndn )
{
int rc;
}
int
-be_isroot_pw( Backend *be, char *ndn, struct berval *cred )
+be_isroot_pw( Backend *be, const char *ndn, struct berval *cred )
{
int result;
if ( ! be_isroot( be, ndn ) ) {
- return( 0 );
+ return 0;
+ }
+
+ if( be->be_root_pw.bv_len == 0 ) {
+ return 0;
}
#ifdef SLAPD_CRYPT
ldap_pvt_thread_mutex_lock( &crypt_mutex );
#endif
- result = lutil_passwd( cred->bv_val, be->be_root_pw, NULL );
+ result = lutil_passwd( &be->be_root_pw, cred, NULL );
#ifdef SLAPD_CRYPT
ldap_pvt_thread_mutex_unlock( &crypt_mutex );
return 0;
}
+int
+backend_check_controls(
+ Backend *be,
+ Connection *conn,
+ Operation *op )
+{
+ LDAPControl **ctrls;
+ ctrls = op->o_ctrls;
+ if( ctrls == NULL ) {
+ return LDAP_SUCCESS;
+ }
+
+ for( ; *ctrls != NULL ; ctrls++ ) {
+ if( (*ctrls)->ldctl_iscritical &&
+ !charray_inlist( be->be_controls, (*ctrls)->ldctl_oid ) )
+ {
+ return LDAP_UNAVAILABLE_CRITICAL_EXTENSION;
+ }
+ }
+
+ return LDAP_SUCCESS;
+}
+
int
backend_group(
Backend *be,
Entry *target,
- char *gr_ndn,
- char *op_ndn,
- char *objectclassValue,
- char *groupattrName
+ const char *gr_ndn,
+ const char *op_ndn,
+ const char *objectclassValue,
+ const char *groupattrName
)
{
if (be->be_group)
#ifdef SLAPD_SCHEMA_DN
Attribute *backend_subschemasubentry( Backend *be )
{
+ /*
+ * This routine returns points to STATIC data!!!
+ */
/* should be backend specific */
+
static struct berval ss_val = {
sizeof(SLAPD_SCHEMA_DN)-1,
SLAPD_SCHEMA_DN };
static Attribute ss_attr = {
"subschemasubentry",
ss_vals,
+#ifdef SLAPD_SCHEMA_COMPAT
SYNTAX_DN | SYNTAX_CIS,
+#endif
NULL
};